-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3091-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Abhijith PA September 02, 2022 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : sofia-sip Version : 1.12.11+20110422.1-2.1+deb10u1 CVE ID : CVE-2022-31001 CVE-2022-31002 CVE-2022-31003 The following vulnerabilities have been discovered in the sofia-sip, a SIP user-agent library. CVE-2022-31001 An attacker can send a message with evil sdp to FreeSWITCH, which will make `n` bigger and trigger out-of-bound access and may cause crash CVE-2022-31002 An attacker can send a message with evil sdp to FreeSWITCH, which may cause crash.This type of crash is caused by url ending with %, the craft message looks like this. CVE-2022-31003 When parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. For Debian 10 buster, these problems have been fixed in version 1.12.11+20110422.1-2.1+deb10u1. We recommend that you upgrade your sofia-sip packages. For the detailed security status of sofia-sip please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sofia-sip Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE7xPqJqaY/zX9fJAuhj1N8u2cKO8FAmMRmHIACgkQhj1N8u2c KO8I6w//V/IjfhQDI62tvBRyFC2/T0rDeYKijdYbC5cyg8oVAD1/kLoUjaJwja6N m7wu3HvbG5ZHy+VlmTk3oP8NWrjEVyUQgGThoYJLtCj5nMFuZtK95lkUlp/G97/h 8hll5xKh+Hu44NtBSMVV6gLv2vwBFpPRD2vOpyFpB5e6PEQbGto8I5p1aCzNWoJF HiKtVwJ2OXCDxwRWyt07btHFZGIzSkpZHQL5+5QNQcvLWVMFyUigghBv5T0Ili9x MdbbCjjpG8TpdxtXBxGR2KNlCYsKC7d08lh6cPNtX9GRHIauwo849BvirvpujkVC kOaqSu4Ynn7G/KbONUt59Sk1vYlhJw36ZNtFItjU69kxcMrrZhOGR3PmCq4XlM0L mlgzoPWxbfkVmPEf25BhSJAoH1KY42UrE6VKEfgNHWcvchlWVgWa+hLdkY5AYmmg OgUYWZJw0sFa5LIDYm6m5Ugjo0Bh3uqBW9tA/IJ9sbQnt17SXgLLsuf8As5IgdKt aSQjR6NuYVNUbdng/KZyI2xGH9Al9JeH25lTgiOO4hK/5gp6A/xXUxpeKoDHSB0M a9B3LkQpemV0/Sa/uSDf/vB4+lLgSI+hbR7zysVRPi/Z4FJt4kCkErYzhFKrbFKV lExWujR73RYlJvnGUkY3gGqJruCba7N0Rfv+U/b7nf0eTG3dPzA= =cPZB -----END PGP SIGNATURE-----